Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe
-
Size
432KB
-
MD5
27a6f94d0f00f7f590b4598d81aae3a4
-
SHA1
6cbc9ecfa4632a5fddff7fa2d9fd6e07f894954b
-
SHA256
221ecd2487198c29b649fe52d9b4750726ca313618fb54fb54d47a34b4ee3564
-
SHA512
a88b3f44c7fe1147d68815580252b092ca9d9f45ad69f0122217cafdb631552097f1c80490fb3583b22c28e5bc8ec4138fa05693c09b81593a90bffc56eba2ae
-
SSDEEP
1536:Suy1OHiO3R1NyCRSzBw2NqVnGLo9TLfFEhC50G9JsP96+T+kmmOON5jU1YYCsMDn:SuyCR2QVGLo9ffFEOsDpjnB9be6
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118" 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2368 set thread context of 2280 2368 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe 30 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\systems.txt 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe File opened for modification C:\Windows\systems.txt 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2368 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe 2280 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe 2280 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe 2280 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2280 2368 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe 30 PID 2368 wrote to memory of 2280 2368 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe 30 PID 2368 wrote to memory of 2280 2368 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe 30 PID 2368 wrote to memory of 2280 2368 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe 30 PID 2368 wrote to memory of 2280 2368 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe 30 PID 2368 wrote to memory of 2280 2368 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe 30 PID 2368 wrote to memory of 2280 2368 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe 30 PID 2368 wrote to memory of 2280 2368 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe 30 PID 2368 wrote to memory of 2280 2368 27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\27a6f94d0f00f7f590b4598d81aae3a4_JaffaCakes118.exe2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:2280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5397e7c5f7b6246adcf4eb482017c7bb6
SHA13fd7a8d6fc413b2a0442702aceaa75eacfb7cbb5
SHA256f94c52b25e262eaef04109bad6d0ad1cf412b78eda4210d41b858e441e660c67
SHA512b5c84aa8cc95b533bd1b875dad18745d6b0e7a6ab7336f882b1601e57e8f83a1da6940bb966d01c4e3d561a4031f9edca0c51a003b71d64ad4df3dd263ca44dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fa0f55e6a255e151bdcc931363cc723
SHA1fc81349a689e5ce392137b672598fb0e5310bff0
SHA25620a4450d2e0762fc05cf94a4625f23ad88f61f35f6cfb9b54e2fbb64d24e6336
SHA512724fb02a2d4b8135b7a38fbd4400d08b88b9cbd5c465904a3de2b1da1c8c780f824c353b519bc3598aab5fcd1a2da2097a40c31cc0b917f67b3f8fce832b7c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5bc4997f44dfa05792c97cfd3ec7faf
SHA151f42cc12a6a6adf1418a7fd8c8185cfa5befa98
SHA256f671fce4298f1b6bd9bd6a6c4518098ddd1b394b5dcf23bbdafca1afb4212677
SHA512625be7f35150e61d160d7bdeac2b8c741c3933fd48cc8c73b0a63fe347b43fd119f8210b8eea1ba4bfc7c8ff31603f8742dcaa9515190faff7a93e282059e3ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5243d9dd69aa77bd04155faaedadffbba
SHA15bec4d1b4a1f8bf739c3f6f8c481a69eab49b61e
SHA256cc7430c48c06404220f6810357cd5cefbf70a3358cf55b14ff609724e864f838
SHA512022d3ddb0b344f04a942d20dfacf940e66e90f386acd8ad66162b588ef7c8abc1c29ce5f1a7281b837e1595c4bc925e41219efbda9b9b61db2fe32b9550379d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eca88d39aa9da1f0a349fa1456cd0a85
SHA16cafa142cb1909315ece97337c0617f86016b6f3
SHA2560e62d4888f9c2e334247225aba4829fc481196a4add2496c3f1f23ab563b1a39
SHA51245a07f635cb045773e98225fee618a84e62418316e501347ecddaf321554686cad42901393189183ce15eb72eac4247e7a88a5970db3b680864d9be5e674af24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d8de4fbec7744962af6348870f0e83
SHA18efbac4aec0cdeb1b0d9a95fcb057e28a73c512d
SHA256eadae52ec1f615248e8df91d52292a7e85c47a32769afe235a3a3694d4681fce
SHA512d5f82a217c6a019b45fc242bab028f4f0a698510dc2af4ca9fbb6ce248acafbd414c0d93d574a998b35f50ec35017985e8f1d10f028ea680f3872dd8a48bf8a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58155f6e6c1b8d87e6eb7f2a1a9fce56f
SHA1ef2ccfaaacf916fbeb2f0facc389c41d834f8ba6
SHA256e774313c84361b9f9c783899bd41ee42469d48518a05bf927c1a00dd768f90fa
SHA512b9e6d2478aef5fafef746748b1a783316eda511b7f917d0a20478c5b78f1b5cc76e5bf5e005d8003845e973808d4261d269a3eb48c5ab360ea4356f869098d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f463de318579b5f8f52571defc04229
SHA1b3eaca32da3515ebd15a3abb07bd1243252b1d0c
SHA2560194ac552eb8dbdae35fa6a3b572688018ce6c753a548a914c7c368e23cccda1
SHA512bd6f93dad5dafed6ab4dc7f359e3239c2d3ede56f0ecd94a32a8e7b0fa8fee00add54031c977425ed591deb171367030c365e88bd470582bc5095411798c8669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed10f436616cfe7b74557cacfab06b46
SHA1a9212ebf5d97fd97be7a594a893bcde6e295edba
SHA25694a96ddf54f4d53962992f767a35460256070d92c576840039a4744816e22fdb
SHA512b2cc5d83d83e3b2aab36aa878d13be3d506e44a68ad70dc6910169c9a7648b3864e86b968df0ae8143cf43f72b385de1387ed5e727e5be003b819641a2c98b18
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b